General

  • Target

    81773d8a2568f634eeb40cd07fb789f62bc85637098e1aeb3512bb8ae2966f84

  • Size

    143KB

  • Sample

    221002-p9gkzahdgp

  • MD5

    627fdbd1a8b76cc582f971e05b5cfe20

  • SHA1

    5512858daacb0160bfa84edb4fc3884a6476091a

  • SHA256

    81773d8a2568f634eeb40cd07fb789f62bc85637098e1aeb3512bb8ae2966f84

  • SHA512

    edfad8ae49023a5288a5337c4a55abda4240af378ce1f7c137796ebabd1859d9131fd2ab38b48a3cf688625ca808916ea8537719734146a1478b71501bcb80fc

Score
5/10

Malware Config

Targets

    • Target

      81773d8a2568f634eeb40cd07fb789f62bc85637098e1aeb3512bb8ae2966f84

    • Size

      143KB

    • MD5

      627fdbd1a8b76cc582f971e05b5cfe20

    • SHA1

      5512858daacb0160bfa84edb4fc3884a6476091a

    • SHA256

      81773d8a2568f634eeb40cd07fb789f62bc85637098e1aeb3512bb8ae2966f84

    • SHA512

      edfad8ae49023a5288a5337c4a55abda4240af378ce1f7c137796ebabd1859d9131fd2ab38b48a3cf688625ca808916ea8537719734146a1478b71501bcb80fc

    Score
    5/10
    • Detected potential entity reuse from brand microsoft.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Collection

    Command and Control

      Credential Access

        Defense Evasion

        Execution

          Exfiltration

            Impact

              Initial Access

                Lateral Movement

                  Persistence

                    Privilege Escalation